
Chronicles the life of Widow, a female kingpin in the global underground of Ransomware-as-a-Service crime syndicates. It follows her group's rise to power to establish itself as the new polar power in the global Ransomware economy.
Tek
FBI Agent 1
FBI Agent 2
Conceal Technician
Winter
6.1Kevin Mitnick is quite possibly the best hacker in the world. Hunting for more and more information, seeking more and more cyber-trophies every day, he constantly looks for bigger challenges. When he breaks into the computer of a security expert and an ex-hacker, he finds one - and much more than that...
7.3Alex Gibney explores the phenomenon of Stuxnet, a self-replicating computer virus discovered in 2010 by international IT experts. Evidently commissioned by the US and Israeli governments, this malware was designed to specifically sabotage Iran’s nuclear programme. However, the complex computer worm ended up not only infecting its intended target but also spreading uncontrollably.
6.0A U.S. Army Captain uses her years of tactical training to save humanity from sixteen nuclear missiles launched at the U.S. as a violent attack threatens her remote missile interceptor station.
6.4A businessman, on his daily commute home, gets unwittingly caught up in a criminal conspiracy that threatens not only his life but the lives of those around him.
6.4In order to be reinstated to the bar and recover custody of her daughter, a hotshot lawyer, now in recovery and on probation, must take on the appeal of a woman wrongfully convicted of murder.
6.8Defiant young activists take the women's suffrage movement by storm, putting their lives at risk to help American women win the right to vote.
5.9Genius hacker Connor discovers Cicada 3301, an online treasure hunt that could be a recruiting tool for a secret society. Soon Conner, art-expert friend Avi, and secretive librarian Gwen are dashing from graffiti sites to ancient libraries to uncover real-world clues. But they must outrun aggressive NSA agents, also hot on the trail of Cicada, who want the glory for themselves.
6.0A nurse is forced to spring a wounded murder suspect from the hospital when the man’s brother kidnaps his pregnant wife and wants to make a trade.
5.8The story of a young writer's transformation when her past invades her present.
6.2A Marine must do whatever it takes to save his kidnapped sister and stop a terrorist attack masterminded by a radical militia group.
6.2A young woman who is determined to maintain her independence finds herself at odds with her family who wants her to tame her wild side and get married.
6.5In a suburban landscape, the lives of several families interlace with loss, despair and personal crisis. Esther Gold has lost focus on all but caring for her comatose son, Paul, and neglects her daughter and husband. Lawyer Jim Train is devoted to his career, not his family. Helen Christianson wants to find a new spark in life, while Annette Jennings tries to rebuild hers.
6.9A boy and his dog, White Fang, must try to save the noble Haida tribe from evil white men in turn-of-the-century Alaska.
7.3A widow with three children hires a handyman to fix her house during a major storm. When not doing home repairs, he shares his philosophy of believing in the power of the universe to deliver what we want.
6.1Max and Page are a brilliant mother/daughter con team who have their grift down to a fine science. Max targets wealthy, willing men and marries them. Page then seduces them, and Max catches her husband in the act. Then it's off to palimony city and the next easy mark.
6.2A former fighter reluctantly returns to the life she abandoned in order to help her sister survive the sadistic world of illegal fighting and the maniac who runs it.
5.9Anastasia Romanov escapes through a portal when her family is threatened by Vladimir Lenin, and she finds herself in the year 1988, befriended by a young American girl.
7.1When librarian Taylor Harris suddenly loses her job, she decides to visit her brother in a small town in Montana. There, she gets involved in the fight to help save her brother's hotel from tycoon Joel Sheenan, who wants to renovate it.
6.0More interested in partying and flirting with young musicians than work, veteran rock journalist Ellie Klug has one last chance to prove her value to her magazine’s editor: a no-stone-unturned search to discover what really happened to long lost rock god, Matt Smith, who also happens to be her ex-boyfriend. Teaming up with an eccentric amateur documentary filmmaker, Ellie hits the road in search of answers.
5.5Aiming to defeat the Man of Steel, wealthy executive Ross Webster hires bumbling but brilliant Gus Gorman to develop synthetic kryptonite, which yields some unexpected psychological effects. Between rekindling romance with his high school sweetheart and saving himself, Superman must contend with a powerful supercomputer.
6.6When brilliant video game maker Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing. In his mission through cyberspace, Flynn matches wits with a maniacal Master Control Program and teams up with Tron, a security measure created to bring balance to the digital environment.
5.5Champion gamer Jan has to fight for his digital identity, winning back his real life as well.
7.3When Bond's latest assignment goes gravely wrong, agents around the world are exposed and MI6 headquarters is attacked. While M faces challenges to her authority and position from Gareth Mallory, the new Chairman of the Intelligence and Security Committee, it's up to Bond, aided only by field agent Eve, to locate the mastermind behind the attack.
6.4A.D. 2400, DEVA's central council detects an incident of unauthorized access into their mainframe. Someone on Earth was trying to hack into the system. The only information DEVA was able to retrieve was that hacker referred to themselves as "Frontier Setter." To investigate the mysterious hacker's motives, the high officials of DEVA dispatch system Security Third Officer Angela Balzac to the Earth's surface. Equipped with a prosthetic "material body," Angela attempts to make contact with a local agent Dingo, but what awaited her instead was a swarm of Sandworms now infesting the Earth's surface. Angela intercepts the gruesome pests with her exoskeleton powered suit Arhan.
0.0A Chief Financial Officer for a large bank is hacked and has the secret pass-phrases to his personal cryptocurrency wallet compromised that holds $25 Million of his own money in it, which he needs for his daughter's heart transplant surgery. With intent on going after the bigger prize -- the bank he works for -- the hackers offer his personal money back in exchange for the password to the account containing $1 Billion of the bank's money.
5.3A fully automated commercial jetliner is prepared to make its maiden voyage. Without an on-flight pilot, the craft relies on satellite linking for its course. But when the plane suddenly deviates from its determined route and establishes a circular pattern over Seattle, it becomes evident that the craft has been hijacked by a disgruntled former airline employee who has hacked into the flight's computer system from his apartment, somewhere in the United States. Now, a former discredited Navy pilot and an oddball technician must race against the clock to find where the angry employee is, and regain control of the plane before it crashes into the city.
7.0Industrious high school senior Vee Delmonico has had it with living life on the sidelines. When pressured by friends to join the popular online game Nerve, Vee decides to sign up for just one dare in what seems like harmless fun. But as she finds herself caught up in the thrill of the adrenaline-fueled competition partnered with a mysterious stranger, the game begins to take a sinister turn with increasingly dangerous acts, leading her into a high stakes finale that will determine her entire future.
6.4The most dangerous former operative of the CIA is drawn out of hiding to uncover hidden truths about his past.
10.0After witnessing the violent arrest of Ted Carter (Ethan N), Kit Porter (Henri L), a tech savvy baseball fan, uncovers a secret government conspiracy to watch over every citizen. After teaming up with Max Stone (Josh M) and Doug Reese (Charlie R), the crew try to take down the surveillance systems and restore privacy to the world. Nominated for multiple yo mama awards. Privacy Breach stands as a potent warning against surveillance, and begs an important question. How far will we go for law and order? After an emotional clip from the film went viral in 2020, directors everywhere looked towards this film for inspiration. Cited as "Your favourite film-makers favourite film", Privacy Breach tries, and succeeds, to tell a unique story that will remain unrivaled in the coming decades. 2020 is the new 1984. Privacy Breach. This aint yo daddys dystopian horror
0.0Ferrari Thunderbird Taylor is getting ready to leave South Carolina behind forever and start a new life in the Queen City - until her deadbeat husband exchanges all their hard-earned money for cryptocurrency at the behest of a shadowy cult figure, known only as Ted. Before her new life can begin, Ferra must dismantle Ted's legion of Apocalypse-preppers, restore her husband's sanity, and salvage what's left of her good name.
0.0Temporal agent Delta Star, a legendary hero from the future, arrives in our time to fight Cavemanoid, who came from the past and is capable of destroying the entire galaxy. However, defeating such a powerful enemy will not be easy...
0.0A bank is hacked and the Security Operations Center manager goes back in time to change a critical decision he made that could change the course of a future breach that has taken down the entire bank.
5.5Eight strangers awaken with no memory, in a puzzling cube-shaped room where the laws of physics do not always apply.
6.6John McClane is back and badder than ever, and this time he calls on the services of a young hacker in his bid to stop a ring of Internet terrorists intent on taking control of America's computer infrastructure.
6.8The movie's plot is based on the true story of a group of young computer hackers from Hannover, Germany. In the late 1980s the orphaned Karl Koch invests his heritage in a flat and a home computer. At first he dials up to bulletin boards to discuss conspiracy theories inspired by his favorite novel, R.A. Wilson's "Illuminatus", but soon he and his friend David start breaking into government and military computers. Pepe, one of Karl's rather criminal acquaintances senses that there is money in computer cracking - he travels to east Berlin and tries to contact the KGB.
6.0Angela Bennett is a freelance computer systems analyst who tracks down software viruses. At night she hooks up to the internet and chats to others 'surfing the net'. While de-bugging a new high-tech game for a cyber friend, she comes across a top secret program and becomes the target of a mysterious organization who will stop at nothing to erase her identity and her existence, in order to protect the project.
6.5Jimi, a computer game designer, finds that his latest product has been infected by a virus which has given consciousness to the main character of the game, Solo. Tormented by the memory of his fled girlfriend Lisa and begged by Solo to end its useless "life", Jimi begins a search for people who can help him both to discover what happened to Lisa and to delete his game before it is released.
